Cantitate/Preț
Produs

Trusted Systems: First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings: Lecture Notes in Computer Science, cartea 6163

Editat de Liqun Chen, Moti Yung
en Limba Engleză Paperback – 15 iul 2010
This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 33057 lei  3-5 săpt.
  Springer Berlin, Heidelberg – 15 iul 2010 33057 lei  3-5 săpt.
  Springer Berlin, Heidelberg – 18 noi 2011 33071 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 33057 lei

Preț vechi: 41322 lei
-20% Nou

Puncte Express: 496

Preț estimativ în valută:
6329 6591$ 5251£

Carte disponibilă

Livrare economică 24 ianuarie-07 februarie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642145964
ISBN-10: 3642145965
Pagini: 277
Ilustrații: XIV, 263 p. 64 illus.
Greutate: 0.52 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Invited Talk.- On Design of a Trusted Software Base with Support of TPCM.- Secure Storage.- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks.- Attestation.- Remote Attestation on Function Execution (Work-in-Progress).- Scalable Remote Attestation with Privacy Protection.- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation.- Trusted Network.- SocialClouds: Concept, Security Architecture and Some Mechanisms.- Privacy Enhanced Trusted Network Connect.- Research on Multistage Interconnection Architecture and Collision Detection Model.- Virtualization.- Trusted Virtual Domains – Design, Implementation and Lessons Learned.- Trusted Integrity Measurement and Reporting for Virtualized Platforms.- Applications.- A Feather-Weight Application Isolation Model.- Exploring Trust of Mobile Applications Based on User Behaviors.- Trusted Firmware Services Based on TPM.- Supporting Technology.- Improved Cryptanalysis of the FOX Block Cipher.- Bitwise Higher Order Differential Cryptanalysis.

Caracteristici

Up-to-date results Fast track conference proceedings State-of-the-art report

Textul de pe ultima copertă

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010.
The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.